Abstract: Structural representation and technology mapping of
a Boolean function is an important problem in the design of nonregenerative
digital logic circuits (also called combinational logic
circuits). Library aware function manipulation offers a solution to
this problem. Compact multi-level representation of binary networks,
based on simple circuit structures, such as AND-Inverter Graphs
(AIG) [1] [5], NAND Graphs, OR-Inverter Graphs (OIG), AND-OR
Graphs (AOG), AND-OR-Inverter Graphs (AOIG), AND-XORInverter
Graphs, Reduced Boolean Circuits [8] does exist in
literature. In this work, we discuss a novel and efficient graph
realization for combinational logic circuits, represented using a
NAND-NOR-Inverter Graph (NNIG), which is composed of only
two-input NAND (NAND2), NOR (NOR2) and inverter (INV) cells.
The networks are constructed on the basis of irredundant disjunctive
and conjunctive normal forms, after factoring, comprising terms with
minimum support. Construction of a NNIG for a non-regenerative
function in normal form would be straightforward, whereas for the
complementary phase, it would be developed by considering a virtual
instance of the function. However, the choice of best NNIG for a
given function would be based upon literal count, cell count and
DAG node count of the implementation at the technology
independent stage. In case of a tie, the final decision would be made
after extracting the physical design parameters.
We have considered AIG representation for reduced disjunctive
normal form and the best of OIG/AOG/AOIG for the minimized
conjunctive normal forms. This is necessitated due to the nature of
certain functions, such as Achilles- heel functions. NNIGs are found
to exhibit 3.97% lesser node count compared to AIGs and
OIG/AOG/AOIGs; consume 23.74% and 10.79% lesser library cells
than AIGs and OIG/AOG/AOIGs for the various samples considered.
We compare the power efficiency and delay improvement achieved
by optimal NNIGs over minimal AIGs and OIG/AOG/AOIGs for
various case studies. In comparison with functionally equivalent,
irredundant and compact AIGs, NNIGs report mean savings in power
and delay of 43.71% and 25.85% respectively, after technology
mapping with a 0.35 micron TSMC CMOS process. For a
comparison with OIG/AOG/AOIGs, NNIGs demonstrate average
savings in power and delay by 47.51% and 24.83%. With respect to
device count needed for implementation with static CMOS logic
style, NNIGs utilize 37.85% and 33.95% lesser transistors than their
AIG and OIG/AOG/AOIG counterparts.
Abstract: Phylogenies ; The evolutionary histories of groups of
species are one of the most widely used tools throughout the life
sciences, as well as objects of research with in systematic,
evolutionary biology. In every phylogenetic analysis reconstruction
produces trees. These trees represent the evolutionary histories of
many groups of organisms, bacteria due to horizontal gene transfer
and plants due to process of hybridization. The process of gene
transfer in bacteria and hybridization in plants lead to reticulate
networks, therefore, the methods of constructing trees fail in
constructing reticulate networks. In this paper a model has been
employed to reconstruct phylogenetic network in honey bee. This
network represents reticulate evolution in honey bee. The maximum
parsimony approach has been used to obtain this reticulate network.
Abstract: User-Centered Design (UCD), Usability Engineering (UE) and Participatory Design (PD) are the common Human- Computer Interaction (HCI) approaches that are practiced in the software development process, focusing towards issues and matters concerning user involvement. It overlooks the organizational perspective of HCI integration within the software development organization. The Management Information Systems (MIS) perspective of HCI takes a managerial and organizational context to view the effectiveness of integrating HCI in the software development process. The Human-Centered Design (HCD) which encompasses all of the human aspects including aesthetic and ergonomic, is claimed as to provide a better approach in strengthening the HCI approaches to strengthen the software development process. In determining the effectiveness of HCD in the software development process, this paper presents the findings of a content analysis of HCI approaches by viewing those approaches as a technology which integrates user requirements, ranging from the top management to other stake holder in the software development process. The findings obtained show that HCD approach is a technology that emphasizes on human, tools and knowledge in strengthening the HCI approaches to strengthen the software development process in the quest to produce a sustainable, usable and useful software product.
Abstract: Complaints today have the ability to retain
customer loyalty using state of the art systems and strategies
in customer relationship management to analyze and respond
to a plethora of customer perception. The Majority of
companies are not aware of the beneficiary utilization of
customer complaints for the sake of quality improvements.
Also, some companies have problems determining how
resolution of complaints can be profitable. In this study, we
will define the problems and ascertain the importance of
customer management system on the companies. Furthermore,
we will determine the impact of such a system on efficiency,
confidence, profitability and customer complaints. Eventually,
we will develop methods and address the issues. In this paper,
we used an open-ended questionnaire and distributed that to
30 randomly chosen respondents which were the passengers in
an airport. We also define three hypotheses for our study and
we will validate each of them. Then using frequency, Chi-
Square and quality control method we optimized the size of
customers- negative feedback and improved the process of
customer retention.
Abstract: In this paper, algorithm estimating the blood pressure
was proposed using the pulse transit time (PTT) as a more convenient
method of measuring the blood pressure. After measuring ECG and
pressure pulse, and photoplethysmography, the PTT was calculated
from the acquired signals. Thereafter, the system to indirectly measure
the systolic pressure and the diastolic pressure was composed using
the statistic method. In comparison between the blood pressure
indirectly measured by proposed algorithm estimating the blood
pressure and real blood pressure measured by conventional
sphygmomanometer, the systolic pressure indicates the mean error of
±3.24mmHg and the standard deviation of 2.53mmHg, while the
diastolic pressure indicates the satisfactory result, that is, the mean
error of ±1.80mmHg and the standard deviation of 1.39mmHg. These
results are satisfied with the regulation of ANSI/AAMI for
certification of sphygmomanometer that real measurement error value
should be within the mean error of ±5mmHg and the standard
deviation of 8mmHg. These results are suggest the possibility of
applying to portable and long time blood pressure monitoring system
hereafter.
Abstract: Ozone (O3) is considered as one of the most
phytotoxic pollutants with deleterious effects on living and non living
components of Ecosystems. It reduces growth and yield of many
crops as well as alters the physiology and crop quality. The present
study described series of experiments to investigate the effects of
ambient O3 at different locations with different ambient levels of O3
depending on proximity to pollutant source and ranged between 17
ppb/h in control experiment to 112 ppb/h in industrial area
respectively. The ambient levels in other three locations (King Saud
University botanical garden, King Fahd Rd, and Almanakh Garden)
were 61,61,77 ppb/h respectively. Tow legume crops species (vicia
vaba L ; and Pisum sativum) differ in their phenology and sensitivity
were used. The results showed a significant negative effect to ozone
on morphology, number of injured leaves, growth and productivity
with a difference in the degree of response depending on the plant
type. Visia Faba showed sensitivity to ozone to number and leaf area
and the degree of injury leaves 3, pisum sativum show higher
sensitivity for the gas for degree of injury 1,The relative growth rate
and seed weight, it turns out there is no significant difference
between the two plants in plant height and number of seeds.
Abstract: Ten simply supported grossly underreinforced
tapered concrete beams of full size were tested upto complete
collapse under flexural effect .Out of 10 beams, 5 beams were
nonfibrous and the remaining beams contained fibres. The beams
had a variation in the tapered angle as 2°, 4°, 6°, 8° and 10°. The
concrete mix, conventional steel and the type of fibre used were
held constant. Flat corrugated steel fibres were utilized as
secondary reinforcement. The strength and stability parameters
were measured. It is established that the fibrous tapered beams can
be used economically in earthquake prone areas.
Abstract: Recently, the RFID (Radio Frequency
Identification) technology attracts the world market attention as
essential technology for ubiquitous environment. The RFID
market has focused on transponders and reader development.
But that concern has shifted to RFID software like as
high-valued e-business applications, RFID middleware and
related development tools. However, due to the high sensitivity
of data and service transaction within the RFID network,
security consideration must be addressed. In order to guarantee
trusted e-business based on RFID technology, we propose a
security enhanced RFID middleware system. Our proposal is
compliant with EPCglobal ALE (Application Level Events),
which is standard interface for middleware and its clients. We
show how to provide strengthened security and trust by
protecting transported data between middleware and its client,
and stored data in middleware. Moreover, we achieve the
identification and service access control against illegal service
abuse. Our system enables secure RFID middleware service
and trusted e-business service.
Abstract: Design patterns describe good solutions to common
and reoccurring problems in program design. Applying design
patterns in software design and implementation have significant
effects on software quality metrics such as flexibility, usability,
reusability, scalability and robustness. There is no standard rule for
using design patterns. There are some situations that a pattern is
applied for a specific problem and this pattern uses another pattern.
In this paper, we study the effect of using chain of patterns on
software quality metrics.
Abstract: Nowadays, quick technological changes force companies
to develop innovative products in an increasingly competitive
environment. Therefore, how to enhance the time of new product
development is very important. This design problem often lacks
the exact formula for getting it, and highly depends upon human
designers- past experiences. For these reasons, in this work, a Casebased
reasoning (CBR) system to assist in new product development
is proposed. When a case is recovered from the case base, the system
will take into account not only the attribute-s specific value and
how important it is. It will also take into account if the attribute
has a positive influence over the product development. Hence the
manufacturing time will be improved. This information will be
introduced as a new concept called “adaptability". An application to
this method for hearing instrument new design illustrates the proposed
approach.
Abstract: As embedded and portable systems were emerged power consumption of circuits had been major challenge. On the other hand latency as determines frequency of circuits is also vital task. Therefore, trade off between both of them will be desirable. Modulo 2n+1 adders are important part of the residue number system (RNS) based arithmetic units with the interesting moduli set (2n-1,2n, 2n+1). In this manuscript we have introduced novel binary representation to the design of modulo 2n+1 adder. VLSI realization of proposed architecture under 180 nm full static CMOS technology reveals its superiority in terms of area, power consumption and power-delay product (PDP) against several peer existing structures.
Abstract: Sediment loads transfer in hydraulic installations and their consequences for the O&M of modern canal systems is emerging as one of the most important considerations in hydraulic engineering projects apriticularly those which are inteded to feed the irrigation and draiange schemes of large command areas such as the Dez and Mogahn in Iran.. The aim of this paper is to investigate the applicability of the vortex tube as a viable means of extracting sediment loads entering the canal systems in general and the water inatke structures in particulars. The Western conveyance canal of the Dez Diversion weir which feeds the Karkheh Flood Plain in Sothwestern Dezful has been used as the case study using the data from the Dastmashan Hydrometric Station. The SHARC software has been used as an analytical framework to interprete the data. Results show that given the grain size D50 and the canal turbulence the adaption length from the beginning of the canal and after the diversion dam is estimated at 477 m, a point which is suitable for laying the vortex tube.
Abstract: To comply with the international human right
legislation concerning the freedom of movement, transport systems
are required to be made accessible in order that all citizens, regardless
of their physical condition, have equal possibilities to use them. In
Hungary, apparently there is a considerable default in the
improvement of accessible public transport. This study is aiming to
overview the current Hungarian situation and to reveal the reasons of
the deficiency. The result shows that in spite of the relatively
favourable juridical background linked to the accessibility needs and
to the rights of persons with disabilities there is a strong delay in
putting all in practice in the field of public transport. Its main reason
is the lack of financial resource and referring to this the lack of
creating mandatory regulations. In addition to this the proprietary
rights related to public transport are also variable, which also limits
the improvement possibilities. Consequently, first of all an accurate
and detailed regulatory procedure is expected to change the present
unfavourable situation and to create the conditions of the fast
realization, which is already behind time.
Abstract: Optical flow is a research topic of interest for many
years. It has, until recently, been largely inapplicable to real-time
applications due to its computationally expensive nature. This paper
presents a new reliable flow technique which is combined with a
motion detection algorithm, from stationary camera image streams,
to allow flow-based analyses of moving entities, such as rigidity, in
real-time. The combination of the optical flow analysis with motion
detection technique greatly reduces the expensive computation of
flow vectors as compared with standard approaches, rendering the
method to be applicable in real-time implementation. This paper
describes also the hardware implementation of a proposed pipelined
system to estimate the flow vectors from image sequences in real
time. This design can process 768 x 576 images at a very high frame
rate that reaches to 156 fps in a single low cost FPGA chip, which is
adequate for most real-time vision applications.
Abstract: The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.
Abstract: In this paper a new approach to face recognition is presented that achieves double dimension reduction making the system computationally efficient with better recognition results. In pattern recognition techniques, discriminative information of image increases with increase in resolution to a certain extent, consequently face recognition results improve with increase in face image resolution and levels off when arriving at a certain resolution level. In the proposed model of face recognition, first image decimation algorithm is applied on face image for dimension reduction to a certain resolution level which provides best recognition results. Due to better computational speed and feature extraction potential of Discrete Cosine Transform (DCT) it is applied on face image. A subset of coefficients of DCT from low to mid frequencies that represent the face adequately and provides best recognition results is retained. A trade of between decimation factor, number of DCT coefficients retained and recognition rate with minimum computation is obtained. Preprocessing of the image is carried out to increase its robustness against variations in poses and illumination level. This new model has been tested on different databases which include ORL database, Yale database and a color database. The proposed technique has performed much better compared to other techniques. The significance of the model is two fold: (1) dimension reduction up to an effective and suitable face image resolution (2) appropriate DCT coefficients are retained to achieve best recognition results with varying image poses, intensity and illumination level.
Abstract: Previous research has demonstrated that negative
attitudes towards people with physical disabilities and obesity are
predicted by a component of perceived vulnerability to disease; germ
aversion. These findings have been suggested as illustrations of an
evolved but over-active mechanism which promotes the avoidance of
pathogen-carrying individuals. To date, this interpretation of attitude
formation has not been explored with regard to people with
intellectual disability, and no attempts have been made to examine
possible mediating factors. This study examined attitudes in 333
adults and demonstrated that the moderate positive relationship
between germ aversion and negative attitudes toward people with
intellectual disability is fully mediated by social dominance
orientation, a general preference for hierarchies and inequalities
among social groups. These findings have implications for the
design of programs which attempt to promote community acceptance
and inclusion of people with disabilities.
Abstract: The frequency dependence of the phase field
model(PFM) is studied. A simple PFM is proposed, and is tested in a
laminar boundary layer. The Blasius-s laminar boundary layer
solution on a flat plate is used for the flow pattern, and several
frequencies are imposed on the PFM, and the decay times of the
interfaces are obtained. The computations were conducted for three
cases: 1) no-flow, and 2) a half ball on the laminar boundary layer, 3) a
line of mass sources in the laminar boundary layer. The computations
show the decay time becomes shorter as the frequency goes larger, and
also show that it is sensitive to both background disturbances and
surface tension parameters. It is concluded that the proposed simple
PFM can describe the properties of decay process, and could give the
fundamentals for the decay of the interface in turbulent flows.
Abstract: Human perceives color in categories, which may be
identified using color name such as red, blue, etc. The categorization
is unique for each human being. However despite the individual
differences, the categorization is shared among members in society.
This allows communication among them, especially when using
color name. Sociable robot, to live coexist with human and become
part of human society, must also have the shared color
categorization, which can be achieved through learning. Many
works have been done to enable computer, as brain of robot, to learn
color categorization. Most of them rely on modeling of human color
perception and mathematical complexities. Differently, in this work,
the computer learns color categorization through interaction with
humans. This work aims at developing the innate ability of the
computer to learn the human-like color categorization. It focuses on
the representation of color categorization and how it is built and
developed without much mathematical complexity.
Abstract: Even though most researchers would agree that in
symbiotic relationships, like the one between parent and child,
influences become reciprocal over time, empirical evidence
supporting this claim is limited. The aim of the current study was to
develop and test a model describing the reciprocal influence between
characteristics of the parent-child relationship, such as closeness and
conflict, and the child-s bullying and victimization experiences at
school. The study used data from the longitudinal Study of Early
Child-Care, conducted by the National Institute of Child Health and
Human Development. The participants were dyads of early
adolescents (5th and 6th graders during the two data collection waves)
and their mothers (N=1364). Supporting our hypothesis, the findings
suggested a reciprocal association between bullying and positive
parenting, although this association was only significant for boys.
Victimization and positive parenting were not significantly
interrelated.